Unfortunately the string of phishing attacks using domain-confusionand legitimate-looking emails continues. This is the same attack PyPI saw a few months agoand targeting many other open source repositoriesbut with a different domain name. Judging from this, we believe this type of campaign will continuewith new domains in the future.
In short, there’s a new phishing campaigntargeting PyPI users occurring right now. The email asks you to “verify their email address”for “account maintenance and security procedures” with a note that your account may be suspended.This email is fake, and the link goes to pypi-mirror.org
If you have already clicked on the link and provided your credentials, we recommend changing yourpassword on PyPI immediately. Inspect your account’s Security History for anything unexpected.Report suspicious activity, such as potential phishing campaigns against PyPI, to security@pypi.org.
There’s no quick-and-easy method for PyPI maintainers to completelyhalt this sort of attack short of requiring phishing-resistant 2FA (such as hardware tokens).Below are the following steps we’re taking to keep users safe:
If you are a maintainer of a package on PyPI, you can help protect your users by adopting the following practices:
As 2025 comes to a close, it's time to look back at another busy year…
Providing insight into our product roadmap and, subsequently, the projects being worked on in our…
Providing insight into our product roadmap and, subsequently, the projects being worked on in our…
TL;DR: Independent Collectives are being converted to Organizations to make the platform more consistent. There…
An attack on the npm ecosystem continues to evolve, exploiting compromised accounts to publish malicious…
We've implemented a new security feature designed to protect PyPI users from phishing attacks: email…
This website uses cookies.